Главная
Study mode:
on
1
Intro
2
You've seen Microservices before
3
Your Legacy Application
4
The Principle of Least Privilege
5
The Principle of Least Surprise
6
The Principle of Least Access
7
Upsides of Microservices AppSec
8
Downsides of Microservices AppSec
9
Exploring Real World Compromise
10
Limit Compromises: OSI Edition
11
Layer 7 Authentication: Application
12
Layer 4/5 (7) Authentication: TLS
13
Layer 3 Authentication: IPSEC
14
Containers Map to Microservices
15
Pruning The Attack Tree
16
Minimal: Distro
17
Security starts with the base OS
18
Minimal Container?
19
Minimal: Container Images
20
General idea for Docker
21
Golang wiki server example
22
Mandatory Access Control
23
Nested AppArmor
24
Custom AppArmor Profiles
25
AppArmor Profile Gotchas
26
Why Custom Profiles?
27
Seccomp Profiles using strace
28
Seccomp Profiles using Seccomp
29
General Seccomp Pitfalls
30
Seccomp in Docker
31
Seccomp notes
32
The Problem of Managing Secrets
33
Other Security Recommendations
Description:
Explore the intricacies of building secure microservices architecture using Docker in this 54-minute conference talk. Delve into practical, real-world examples of creating high-security Docker containers, leveraging the latest security features such as User Namespaces and seccomp-bpf. Learn about often-overlooked security principles, network security challenges, secrets management, and application hardening techniques. Gain insights into designing minimal container images, implementing Mandatory Access Control, creating custom AppArmor profiles, and utilizing Seccomp profiles. Discover the security benefits and potential downsides of microservices, and understand how to limit compromises across different OSI layers. Whether you're focused on microservices or general Docker usage, acquire valuable knowledge to enhance your container security practices.

The Golden Ticket - Docker and High Security Microservices

Docker
Add to list